Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:01
Behavioral task
behavioral1
Sample
63448f7a15593c12dfaacd43ee45b66fc71efdc9c0c0e1469c44d3869c508a7c.exe
Resource
win7-20241010-en
7 signatures
120 seconds
General
-
Target
63448f7a15593c12dfaacd43ee45b66fc71efdc9c0c0e1469c44d3869c508a7c.exe
-
Size
332KB
-
MD5
38d8924f73df6b266def758ff82faf91
-
SHA1
0f7a0848b582805636c8ba3f51daea758539a29f
-
SHA256
63448f7a15593c12dfaacd43ee45b66fc71efdc9c0c0e1469c44d3869c508a7c
-
SHA512
bc6c23bd697d58a37986f42c633cf41abaf214b88b22ed32512cda158321d41579457547eedf7c9fbca423724665ef146ad44e8e05ad9815b13d95a2267991c3
-
SSDEEP
6144:Lcm4FmowdHoSHt251UriZFwfsDX2UznsaFVNJCMKAbe3:R4wFHoSHYHUrAwfMp3CD3
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/4808-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2024-5-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4064-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4768-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1212-21-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4224-27-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4324-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1880-32-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/388-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1240-53-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5008-63-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4568-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1816-70-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2880-77-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4960-83-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1040-91-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1320-99-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2104-98-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3284-109-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4352-110-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3136-121-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1100-125-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1208-143-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2740-148-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4788-152-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4792-157-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4840-160-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2856-163-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/740-166-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3472-169-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4204-174-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1448-177-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/428-180-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4196-187-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4764-192-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3420-193-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4456-200-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2292-211-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2196-234-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4364-241-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3036-250-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4436-257-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2792-268-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4864-277-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3984-288-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2072-303-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4792-308-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2300-311-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1828-330-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4316-343-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4532-356-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2320-369-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1800-378-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2576-393-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1944-396-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1712-459-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3332-486-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/776-503-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3360-556-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2076-613-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1896-656-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4824-977-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2980-1083-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4808 lxxrlfx.exe 4768 06444.exe 4064 lflrrll.exe 1212 20004.exe 4224 vpvpv.exe 1880 828822.exe 4324 084826.exe 2328 0288882.exe 388 pjpjd.exe 1240 4260226.exe 1668 3frlrrr.exe 5008 4068444.exe 4568 ttnbhh.exe 1816 tbhbbt.exe 2880 9dddv.exe 4960 frlrlrl.exe 4052 xflfffx.exe 1040 220800.exe 2104 88860.exe 1320 tnnhbb.exe 3284 7ppjd.exe 4352 8620044.exe 2140 rllllrr.exe 3136 004462.exe 1100 846608.exe 1672 1xflllf.exe 1252 xfllffx.exe 3352 dvdvp.exe 1208 62826.exe 2740 9nnntt.exe 4788 hhnhbt.exe 4792 62488.exe 4840 1nbnbb.exe 2856 llfflrr.exe 740 bhbhtt.exe 3472 vppjd.exe 2596 jddvp.exe 4204 0408260.exe 1448 thtnhn.exe 428 7ddvp.exe 3232 4282004.exe 4520 c888282.exe 4196 lrxlfff.exe 1624 2862622.exe 4764 5djjd.exe 3420 606040.exe 3160 9lxlflf.exe 4456 8648046.exe 3372 668604.exe 2168 frxxxxx.exe 3344 3pdvv.exe 2944 0448040.exe 2292 006226.exe 4572 hbbtnn.exe 1852 w62044.exe 400 86004.exe 936 s0086.exe 1880 7xxxrrr.exe 1108 6028062.exe 2164 48028.exe 1952 0066448.exe 2268 822644.exe 2508 a6848.exe 2196 260440.exe -
resource yara_rule behavioral2/memory/2024-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023b1e-3.dat upx behavioral2/memory/4808-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2024-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b71-9.dat upx behavioral2/files/0x000a000000023b75-11.dat upx behavioral2/memory/4064-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4768-16-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1212-21-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0031000000023b78-25.dat upx behavioral2/memory/4224-27-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7a-34.dat upx behavioral2/memory/4324-36-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1880-32-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b79-30.dat upx behavioral2/files/0x0031000000023b76-20.dat upx behavioral2/files/0x000a000000023b7b-39.dat upx behavioral2/files/0x000a000000023b7c-43.dat upx behavioral2/files/0x000a000000023b7d-47.dat upx behavioral2/memory/388-49-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7e-52.dat upx behavioral2/memory/1240-53-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7f-57.dat upx behavioral2/files/0x000b000000023b72-61.dat upx behavioral2/memory/5008-63-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b80-67.dat upx behavioral2/memory/4568-68-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1816-70-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b81-72.dat upx behavioral2/files/0x000a000000023b82-76.dat upx behavioral2/memory/2880-77-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b83-81.dat upx behavioral2/memory/4960-83-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b84-87.dat upx behavioral2/memory/1040-88-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1040-91-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b85-92.dat upx behavioral2/files/0x000a000000023b86-96.dat upx behavioral2/memory/1320-99-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2104-98-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b88-102.dat upx behavioral2/files/0x000a000000023b89-107.dat upx behavioral2/memory/3284-109-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b8a-113.dat upx behavioral2/memory/4352-110-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b8b-116.dat upx behavioral2/files/0x000a000000023b8c-120.dat upx behavioral2/memory/3136-121-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1100-125-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b8d-126.dat upx behavioral2/files/0x000a000000023b8e-130.dat upx behavioral2/files/0x000a000000023b8f-134.dat upx behavioral2/files/0x000a000000023b90-138.dat upx behavioral2/files/0x000a000000023b91-142.dat upx behavioral2/memory/1208-143-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b92-147.dat upx behavioral2/memory/2740-148-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b93-153.dat upx behavioral2/memory/4788-152-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4792-157-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4840-160-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2856-163-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/740-166-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3472-169-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxlffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nbnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s8082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c248664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 268248.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6442828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxlfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxllrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u026260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrfllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8848848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 4808 2024 63448f7a15593c12dfaacd43ee45b66fc71efdc9c0c0e1469c44d3869c508a7c.exe 83 PID 2024 wrote to memory of 4808 2024 63448f7a15593c12dfaacd43ee45b66fc71efdc9c0c0e1469c44d3869c508a7c.exe 83 PID 2024 wrote to memory of 4808 2024 63448f7a15593c12dfaacd43ee45b66fc71efdc9c0c0e1469c44d3869c508a7c.exe 83 PID 4808 wrote to memory of 4768 4808 lxxrlfx.exe 84 PID 4808 wrote to memory of 4768 4808 lxxrlfx.exe 84 PID 4808 wrote to memory of 4768 4808 lxxrlfx.exe 84 PID 4768 wrote to memory of 4064 4768 06444.exe 85 PID 4768 wrote to memory of 4064 4768 06444.exe 85 PID 4768 wrote to memory of 4064 4768 06444.exe 85 PID 4064 wrote to memory of 1212 4064 lflrrll.exe 86 PID 4064 wrote to memory of 1212 4064 lflrrll.exe 86 PID 4064 wrote to memory of 1212 4064 lflrrll.exe 86 PID 1212 wrote to memory of 4224 1212 20004.exe 87 PID 1212 wrote to memory of 4224 1212 20004.exe 87 PID 1212 wrote to memory of 4224 1212 20004.exe 87 PID 4224 wrote to memory of 1880 4224 vpvpv.exe 88 PID 4224 wrote to memory of 1880 4224 vpvpv.exe 88 PID 4224 wrote to memory of 1880 4224 vpvpv.exe 88 PID 1880 wrote to memory of 4324 1880 828822.exe 89 PID 1880 wrote to memory of 4324 1880 828822.exe 89 PID 1880 wrote to memory of 4324 1880 828822.exe 89 PID 4324 wrote to memory of 2328 4324 084826.exe 90 PID 4324 wrote to memory of 2328 4324 084826.exe 90 PID 4324 wrote to memory of 2328 4324 084826.exe 90 PID 2328 wrote to memory of 388 2328 0288882.exe 91 PID 2328 wrote to memory of 388 2328 0288882.exe 91 PID 2328 wrote to memory of 388 2328 0288882.exe 91 PID 388 wrote to memory of 1240 388 pjpjd.exe 92 PID 388 wrote to memory of 1240 388 pjpjd.exe 92 PID 388 wrote to memory of 1240 388 pjpjd.exe 92 PID 1240 wrote to memory of 1668 1240 4260226.exe 93 PID 1240 wrote to memory of 1668 1240 4260226.exe 93 PID 1240 wrote to memory of 1668 1240 4260226.exe 93 PID 1668 wrote to memory of 5008 1668 3frlrrr.exe 94 PID 1668 wrote to memory of 5008 1668 3frlrrr.exe 94 PID 1668 wrote to memory of 5008 1668 3frlrrr.exe 94 PID 5008 wrote to memory of 4568 5008 4068444.exe 95 PID 5008 wrote to memory of 4568 5008 4068444.exe 95 PID 5008 wrote to memory of 4568 5008 4068444.exe 95 PID 4568 wrote to memory of 1816 4568 ttnbhh.exe 96 PID 4568 wrote to memory of 1816 4568 ttnbhh.exe 96 PID 4568 wrote to memory of 1816 4568 ttnbhh.exe 96 PID 1816 wrote to memory of 2880 1816 tbhbbt.exe 97 PID 1816 wrote to memory of 2880 1816 tbhbbt.exe 97 PID 1816 wrote to memory of 2880 1816 tbhbbt.exe 97 PID 2880 wrote to memory of 4960 2880 9dddv.exe 98 PID 2880 wrote to memory of 4960 2880 9dddv.exe 98 PID 2880 wrote to memory of 4960 2880 9dddv.exe 98 PID 4960 wrote to memory of 4052 4960 frlrlrl.exe 99 PID 4960 wrote to memory of 4052 4960 frlrlrl.exe 99 PID 4960 wrote to memory of 4052 4960 frlrlrl.exe 99 PID 4052 wrote to memory of 1040 4052 xflfffx.exe 100 PID 4052 wrote to memory of 1040 4052 xflfffx.exe 100 PID 4052 wrote to memory of 1040 4052 xflfffx.exe 100 PID 1040 wrote to memory of 2104 1040 220800.exe 101 PID 1040 wrote to memory of 2104 1040 220800.exe 101 PID 1040 wrote to memory of 2104 1040 220800.exe 101 PID 2104 wrote to memory of 1320 2104 88860.exe 102 PID 2104 wrote to memory of 1320 2104 88860.exe 102 PID 2104 wrote to memory of 1320 2104 88860.exe 102 PID 1320 wrote to memory of 3284 1320 tnnhbb.exe 103 PID 1320 wrote to memory of 3284 1320 tnnhbb.exe 103 PID 1320 wrote to memory of 3284 1320 tnnhbb.exe 103 PID 3284 wrote to memory of 4352 3284 7ppjd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\63448f7a15593c12dfaacd43ee45b66fc71efdc9c0c0e1469c44d3869c508a7c.exe"C:\Users\Admin\AppData\Local\Temp\63448f7a15593c12dfaacd43ee45b66fc71efdc9c0c0e1469c44d3869c508a7c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
\??\c:\lxxrlfx.exec:\lxxrlfx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
\??\c:\06444.exec:\06444.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
\??\c:\lflrrll.exec:\lflrrll.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4064 -
\??\c:\20004.exec:\20004.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
\??\c:\vpvpv.exec:\vpvpv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4224 -
\??\c:\828822.exec:\828822.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1880 -
\??\c:\084826.exec:\084826.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\0288882.exec:\0288882.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
\??\c:\pjpjd.exec:\pjpjd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:388 -
\??\c:\4260226.exec:\4260226.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1240 -
\??\c:\3frlrrr.exec:\3frlrrr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
\??\c:\4068444.exec:\4068444.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
\??\c:\ttnbhh.exec:\ttnbhh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
\??\c:\tbhbbt.exec:\tbhbbt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
\??\c:\9dddv.exec:\9dddv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\frlrlrl.exec:\frlrlrl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
\??\c:\xflfffx.exec:\xflfffx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4052 -
\??\c:\220800.exec:\220800.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
\??\c:\88860.exec:\88860.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104 -
\??\c:\tnnhbb.exec:\tnnhbb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1320 -
\??\c:\7ppjd.exec:\7ppjd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
\??\c:\8620044.exec:\8620044.exe23⤵
- Executes dropped EXE
PID:4352 -
\??\c:\rllllrr.exec:\rllllrr.exe24⤵
- Executes dropped EXE
PID:2140 -
\??\c:\004462.exec:\004462.exe25⤵
- Executes dropped EXE
PID:3136 -
\??\c:\846608.exec:\846608.exe26⤵
- Executes dropped EXE
PID:1100 -
\??\c:\1xflllf.exec:\1xflllf.exe27⤵
- Executes dropped EXE
PID:1672 -
\??\c:\xfllffx.exec:\xfllffx.exe28⤵
- Executes dropped EXE
PID:1252 -
\??\c:\dvdvp.exec:\dvdvp.exe29⤵
- Executes dropped EXE
PID:3352 -
\??\c:\62826.exec:\62826.exe30⤵
- Executes dropped EXE
PID:1208 -
\??\c:\9nnntt.exec:\9nnntt.exe31⤵
- Executes dropped EXE
PID:2740 -
\??\c:\hhnhbt.exec:\hhnhbt.exe32⤵
- Executes dropped EXE
PID:4788 -
\??\c:\62488.exec:\62488.exe33⤵
- Executes dropped EXE
PID:4792 -
\??\c:\1nbnbb.exec:\1nbnbb.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4840 -
\??\c:\llfflrr.exec:\llfflrr.exe35⤵
- Executes dropped EXE
PID:2856 -
\??\c:\bhbhtt.exec:\bhbhtt.exe36⤵
- Executes dropped EXE
PID:740 -
\??\c:\vppjd.exec:\vppjd.exe37⤵
- Executes dropped EXE
PID:3472 -
\??\c:\jddvp.exec:\jddvp.exe38⤵
- Executes dropped EXE
PID:2596 -
\??\c:\0408260.exec:\0408260.exe39⤵
- Executes dropped EXE
PID:4204 -
\??\c:\thtnhn.exec:\thtnhn.exe40⤵
- Executes dropped EXE
PID:1448 -
\??\c:\7ddvp.exec:\7ddvp.exe41⤵
- Executes dropped EXE
PID:428 -
\??\c:\4282004.exec:\4282004.exe42⤵
- Executes dropped EXE
PID:3232 -
\??\c:\c888282.exec:\c888282.exe43⤵
- Executes dropped EXE
PID:4520 -
\??\c:\lrxlfff.exec:\lrxlfff.exe44⤵
- Executes dropped EXE
PID:4196 -
\??\c:\2862622.exec:\2862622.exe45⤵
- Executes dropped EXE
PID:1624 -
\??\c:\5djjd.exec:\5djjd.exe46⤵
- Executes dropped EXE
PID:4764 -
\??\c:\606040.exec:\606040.exe47⤵
- Executes dropped EXE
PID:3420 -
\??\c:\9lxlflf.exec:\9lxlflf.exe48⤵
- Executes dropped EXE
PID:3160 -
\??\c:\8648046.exec:\8648046.exe49⤵
- Executes dropped EXE
PID:4456 -
\??\c:\668604.exec:\668604.exe50⤵
- Executes dropped EXE
PID:3372 -
\??\c:\frxxxxx.exec:\frxxxxx.exe51⤵
- Executes dropped EXE
PID:2168 -
\??\c:\3pdvv.exec:\3pdvv.exe52⤵
- Executes dropped EXE
PID:3344 -
\??\c:\0448040.exec:\0448040.exe53⤵
- Executes dropped EXE
PID:2944 -
\??\c:\006226.exec:\006226.exe54⤵
- Executes dropped EXE
PID:2292 -
\??\c:\hbbtnn.exec:\hbbtnn.exe55⤵
- Executes dropped EXE
PID:4572 -
\??\c:\w62044.exec:\w62044.exe56⤵
- Executes dropped EXE
PID:1852 -
\??\c:\86004.exec:\86004.exe57⤵
- Executes dropped EXE
PID:400 -
\??\c:\s0086.exec:\s0086.exe58⤵
- Executes dropped EXE
PID:936 -
\??\c:\7xxxrrr.exec:\7xxxrrr.exe59⤵
- Executes dropped EXE
PID:1880 -
\??\c:\6028062.exec:\6028062.exe60⤵
- Executes dropped EXE
PID:1108 -
\??\c:\48028.exec:\48028.exe61⤵
- Executes dropped EXE
PID:2164 -
\??\c:\0066448.exec:\0066448.exe62⤵
- Executes dropped EXE
PID:1952 -
\??\c:\822644.exec:\822644.exe63⤵
- Executes dropped EXE
PID:2268 -
\??\c:\a6848.exec:\a6848.exe64⤵
- Executes dropped EXE
PID:2508 -
\??\c:\260440.exec:\260440.exe65⤵
- Executes dropped EXE
PID:2196 -
\??\c:\5rxfffx.exec:\5rxfffx.exe66⤵PID:4576
-
\??\c:\hbhhhb.exec:\hbhhhb.exe67⤵PID:628
-
\??\c:\7hhhbb.exec:\7hhhbb.exe68⤵PID:4364
-
\??\c:\m2482.exec:\m2482.exe69⤵PID:2256
-
\??\c:\0426806.exec:\0426806.exe70⤵PID:1944
-
\??\c:\lflfffx.exec:\lflfffx.exe71⤵PID:516
-
\??\c:\284822.exec:\284822.exe72⤵PID:3036
-
\??\c:\fxlrxlx.exec:\fxlrxlx.exe73⤵PID:3832
-
\??\c:\rxxrllf.exec:\rxxrllf.exe74⤵PID:4056
-
\??\c:\s6420.exec:\s6420.exe75⤵PID:4436
-
\??\c:\rlxlfxr.exec:\rlxlfxr.exe76⤵PID:2900
-
\??\c:\206048.exec:\206048.exe77⤵PID:3212
-
\??\c:\hhhbtb.exec:\hhhbtb.exe78⤵PID:1040
-
\??\c:\vjdpd.exec:\vjdpd.exe79⤵PID:4392
-
\??\c:\48042.exec:\48042.exe80⤵PID:2792
-
\??\c:\c402042.exec:\c402042.exe81⤵PID:1616
-
\??\c:\httthn.exec:\httthn.exe82⤵PID:3292
-
\??\c:\fxxlffx.exec:\fxxlffx.exe83⤵PID:3236
-
\??\c:\rrxrllf.exec:\rrxrllf.exe84⤵PID:4864
-
\??\c:\7bnhbh.exec:\7bnhbh.exe85⤵PID:2772
-
\??\c:\26822.exec:\26822.exe86⤵PID:4900
-
\??\c:\pddvp.exec:\pddvp.exe87⤵PID:3136
-
\??\c:\3bthbn.exec:\3bthbn.exe88⤵PID:1100
-
\??\c:\4464048.exec:\4464048.exe89⤵PID:3984
-
\??\c:\88260.exec:\88260.exe90⤵PID:836
-
\??\c:\bnnbtt.exec:\bnnbtt.exe91⤵PID:2652
-
\??\c:\9vpvp.exec:\9vpvp.exe92⤵PID:3380
-
\??\c:\86820.exec:\86820.exe93⤵PID:1508
-
\??\c:\0286486.exec:\0286486.exe94⤵PID:3804
-
\??\c:\0622004.exec:\0622004.exe95⤵PID:2740
-
\??\c:\vjvjd.exec:\vjvjd.exe96⤵PID:2072
-
\??\c:\426022.exec:\426022.exe97⤵PID:2064
-
\??\c:\u842604.exec:\u842604.exe98⤵PID:4792
-
\??\c:\o086802.exec:\o086802.exe99⤵PID:2300
-
\??\c:\o664486.exec:\o664486.exe100⤵PID:3140
-
\??\c:\3flfxrx.exec:\3flfxrx.exe101⤵PID:1560
-
\??\c:\1hhbtn.exec:\1hhbtn.exe102⤵PID:4296
-
\??\c:\28444.exec:\28444.exe103⤵PID:4220
-
\??\c:\3jdpj.exec:\3jdpj.exe104⤵PID:4048
-
\??\c:\djpdp.exec:\djpdp.exe105⤵PID:4916
-
\??\c:\i682262.exec:\i682262.exe106⤵PID:1000
-
\??\c:\046026.exec:\046026.exe107⤵PID:428
-
\??\c:\vdjdv.exec:\vdjdv.exe108⤵PID:1828
-
\??\c:\thhbnh.exec:\thhbnh.exe109⤵PID:4284
-
\??\c:\e22642.exec:\e22642.exe110⤵PID:3368
-
\??\c:\e84860.exec:\e84860.exe111⤵PID:1624
-
\??\c:\vdpjd.exec:\vdpjd.exe112⤵PID:4764
-
\??\c:\rrfxlxl.exec:\rrfxlxl.exe113⤵PID:4564
-
\??\c:\600488.exec:\600488.exe114⤵PID:4316
-
\??\c:\04660.exec:\04660.exe115⤵PID:3404
-
\??\c:\dvpdv.exec:\dvpdv.exe116⤵PID:3124
-
\??\c:\flrllff.exec:\flrllff.exe117⤵PID:3580
-
\??\c:\bbhthb.exec:\bbhthb.exe118⤵PID:3384
-
\??\c:\llrfxrf.exec:\llrfxrf.exe119⤵PID:4984
-
\??\c:\08040.exec:\08040.exe120⤵PID:4532
-
\??\c:\9xxrffr.exec:\9xxrffr.exe121⤵PID:2884
-
\??\c:\4004488.exec:\4004488.exe122⤵PID:696
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-